• 제목/요약/키워드: access structure

검색결과 1,297건 처리시간 0.027초

BcN 적합형 액세스네트워크 구조 (The Access Network Architecture for BcN Adapted)

  • 이상문
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2007년도 학술대회
    • /
    • pp.121-124
    • /
    • 2007
  • This article describes a function and structure of access network equipment under BcN environment. Access network until now have constructed separately to offer voice, data service. However, simplifies network structure, function that can do traffic concentration, subscriber certification, individual charging, QoS according to service and routing is required in BcN. In this paper, compare method offering by separate system with existing access network and method that offer integrating function inside system for structure of suitable access network to BcN and search structure of access network equipment for desirable access network of hereafter. Composition of this paper is as following. In Chapter 2, establishment history and structure of access network until present. In Chaprte 3, define suitable requirement and functions to BcN. And compare structure for access net work that is new with present. Last Chapter 4, suggests direction of structure of BcN access network and concludes conclusion.

  • PDF

Fully secure non-monotonic access structure CP-ABE scheme

  • Yang, Dan;Wang, Baocang;Ban, Xuehua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권3호
    • /
    • pp.1315-1329
    • /
    • 2018
  • Ciphertext-policy attribute-based encryption (CP-ABE) associates ciphertext with access policies. Only when the user's attributes satisfy the ciphertext's policy, they can be capable to decrypt the ciphertext. Expressivity and security are the two directions for the research of CP-ABE. Most of the existing schemes only consider monotonic access structures are selectively secure, resulting in lower expressivity and lower security. Therefore, fully secure CP-ABE schemes with non-monotonic access structure are desired. In the existing fully secure non-monotonic access structure CP-ABE schemes, the attributes that are set is bounded and a one-use constraint is required by these projects on attributes, and efficiency will be lost. In this paper, to overcome the flaw referred to above, we propose a new fully secure non-monotonic access structure CP-ABE. Our proposition enforces no constraints on the scale of the attributes that are set and permits attributes' unrestricted utilization. Furthermore, the scheme's public parameters are composed of a constant number of group elements. We further compare the performance of our scheme with former non-monotonic access structure ABE schemes. It is shown that our scheme has relatively lower computation cost and stronger security.

A MATHEMATICAL MODEL FOR HISTORY-BASED ACCESS CONTROL

  • Kim, Hee-Young
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제8권1호
    • /
    • pp.11-30
    • /
    • 2004
  • Access Control is one of essential branches to provide system's security. Depending on what standards we apply, in general, there are Role-based access control, History-based access control. The first is based on subject's role, The later is based on subject's history. In fact, RBAC has been implemented, we are using it by purchasing some orders through the internet. But, HBAC is so complex that there will occur some errors on the system. This is more and more when HBAC is used with other access controls. So HBAC's formalization and model which are general enough to encompass a range of policies in using more than one access control model within a given system are important. To simplify these, we design the mathematical model called non-access structure. This Non-access structure contains to historical access list. If it is given subjects and objects, we look into subject grouping and object relation, and then we design Non-access structure. Then we can determine the permission based on history without conflict.

  • PDF

A Label Graph Based Verifiable Secret Sharing Scheme for General Access Structures

  • Hsu, Ching-Fang;Zeng, Bing;Cheng, Qi
    • Journal of Communications and Networks
    • /
    • 제15권4호
    • /
    • pp.407-410
    • /
    • 2013
  • Secret sharing is that a dealer distributes a piece of information (called a share) about a secret to each participant such that authorized subsets of participants can reconstruct the secret but unauthorized subsets of participants cannot determine the secret. In this paper, an access structure can be represented by a label graph G, where a vertex denotes a participant and a complete subgraph of G corresponds to a minimal authorized subset. The vertices of G are labeled into distinct vectors uniquely determined by the maximum prohibited structure. Based on such a label graph, a verifiable secret sharing scheme realizing general access structures is proposed. A major advantage of this scheme is that it applies to any access structure, rather than only structures representable as previous graphs, i.e., the access structures of rank two. Furthermore, verifiability of the proposed scheme can resist possible internal attack performed by malicious participants, who want to obtain additional shares or provide a fake share to other participants.

CMS(Contents Management System)의 Access Structure에 관한 설계 및 구현 (Design and Implementation of Access Structure-based Contents Management System)

  • 문남미;유소연
    • 한국멀티미디어학회:학술대회논문집
    • /
    • 한국멀티미디어학회 2002년도 춘계학술발표논문집(상)
    • /
    • pp.133-137
    • /
    • 2002
  • 대량의 컨텐츠에 대한 정보 관리 및 잦은 사이트 변화에 따른 퍼블리케이션의 용이성으로 CMS(Contents Management System)의 도입이 많이 이루어지고 있다. 본 논문에서는 CMS의 백앤드와 프론트 엔드를 연결하는 Access Structure 에 관해 고찰해보고, 이를 통해 시스템의 컨텐츠 검색을 효율적으로 지원할 수 있는 방안과 카테고리 수의 무분별한 증가를 막고자 하며, 퍼블리케이션에서의 확장된 아키텍쳐를 지원하기 위한 모델을 제안하고자 한다.

  • PDF

호텔 진입공간의 유형별 인지특성 및 이미지형성구조에 관한 연구 (A Study on the Cognitive Characteristics and Image Formation Structure of Hotel Access Space)

  • 이정림;조용준
    • 한국주거학회논문집
    • /
    • 제20권5호
    • /
    • pp.9-21
    • /
    • 2009
  • This study classified visual perception types of access space at 17 five-star hotels in Jejudo and examined their cognitive characteristics and image formation structures in an effort to provide basic information important for designing the elevation and the access spaces of a hotel. The results of this study are as follows. Access space image of experimental hotels showed more negative evaluations at both city hotels and resort hotels, viewing angle (upward angle) was also positively evaluated between $10^{\circ}{\sim}12^{\circ}$ and $18^{\circ}$ and central type in arrangement type and detour access and straight access types in access circulation type were positively evaluated. When viewed from an upward angle of $10^{\circ}$ to $12^{\circ}$, the most important factors were as plasticity, decorativeness, and creativity; from $18^{\circ}$ it was such factors as harmony and peculiarity; and at $45^{\circ}$ it was factors like decorativeness and stability. In considering the various access types, the most important factors in a straight access type were peculiarity and harmony; for one-time curved access type it was by decorativeness, creativity, Peculiarity, and stability; and for detour access types it was decorativeness, stability, and peculiarity. Influential of factors affecting image formation and plasticity and harmony factors and the form had more influences on image formation.

광대역 무선 액세스를 위한 다중 수신안테나를 갖는 OFDMA 시스템의 낮은 복잡도의 타이밍 딜레이 추정기 구현 (Low-complexity implementation of OFDMA timing delay detector with multiple receive antennas for broadband wireless access)

  • 원희철
    • 한국산업정보학회논문지
    • /
    • 제12권3호
    • /
    • pp.19-30
    • /
    • 2007
  • 본 논문은 광대역 무선 액세스를 위하여 다중 수신안테나를 갖는 OFDMA 시스템의 타이밍 딜레이 추정기의 구현 복잡도를 낮추는 방안을 제안한다. 타이밍 딜레이 값을 추정하기 위해 각 수신안테나 별로 푸리에 연산과 역 푸리에 연산을 수행하므로, 다중 수신안테나를 사용하는 경우에는 계산 복잡도가 큰 단점이 있다. 먼저, 각 안테나에 수신된 레인징 심볼의 위상을 회전시키는 구조를 제안함으로써 각 안테나의 역 푸리에 연산을 제거하여 구현 복잡도를 크게 개선할 수 있다. 둘째로, N점/M구간 푸리에 연산을 수행하고 시간 대역 평균 전력 추정기 대신 주파수 대역 평균 전력 추정기를 포함한 구조를 제안함으로써 성능 저하 없이 복잡도를 크게 낮출 수 있다. 기존 방식에 대하여 제안된 두 가지 구조의 복잡도 개선량을 보여주고, 시뮬레이션 결과를 통해 성능 비교를 실시한다.

  • PDF

점진적인 웹 마이닝을 위한 효율적인 후보패턴 저장 트리구조 및 알고리즘 (An Efficient Candidate Pattern Storage Tree Structure and Algorithm for Incremental Web Mining)

  • 강희성;박병준
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.3-5
    • /
    • 2006
  • Recent advances in the internet infrastructure have resulted in a large number of huge Web sites and portals worldwide. These Web sites are being visited by various types of users in many different ways. Among all the web page access sequences from different users, some of them occur so frequently that may need an attention from those who are interested. We call them frequent access patterns and access sequences that can be frequent the candidate patterns. Since these candidate patterns play an important role in the incremental Web mining, it is important to efficiently generate, add, delete, and search for them. This thesis presents a novel tree structure that can efficiently store the candidate patterns and a related set of algorithms for generating the tree structure adding new patterns, deleting unnecessary patterns, and searching for the needed ones. The proposed tree structure has a kind of the 3 dimensional link structure and its nodes are layered.

  • PDF

Cyber Museum User Interface의 구성과 구조에 관한 고찰 (A Study on analysis of architecture and user interface at cyber museum)

  • 구세연;임채진
    • 한국실내디자인학회:학술대회논문집
    • /
    • 한국실내디자인학회 2001년도 춘계학술발표대회 논문집
    • /
    • pp.121-127
    • /
    • 2001
  • An unified measure of user interface efficiency and aesthetics for cyber museum is proposed. First, general structure of cyber museum is discussed and hierarchical analyses are done for sample sites. Usability tests based on the hierarchical analyses yield statistics of user access frequency and persistency for each page, on which access probability is deduced. Second, visual occupancy, a measure of efficiency of user interface element based on access probability is defined. The hierarchical statistics of visual occupancy can be an index for characterization and classification of cyber museums. Examples are provided.

  • PDF

하부전극 구조 개선에 의한 상변화 메모리의 전기적 특성 (Electrical characteristic of Phase-change Random Access Memory with improved bottom electrode structure)

  • 김현구;최혁;조원주;정홍배
    • 한국전기전자재료학회:학술대회논문집
    • /
    • 한국전기전자재료학회 2006년도 추계학술대회 논문집 Vol.19
    • /
    • pp.69-70
    • /
    • 2006
  • A detailed Investigation of cell structure and electrical characteristic in chalcogenide-based phase-change random access memory(PRAM) devices is presented. We used compound of Ge-Sb-Te material for phase-change cell. A novel bottom electrode structure and manufacture are described. We used heat radiator structure for improved reset characteristic. A resistance change measurement is performed on the test chip. From the resistance change, we could observe faster reset characteristic.

  • PDF